Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
636bdba351767eeb786bc14205e0b7fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
636bdba351767eeb786bc14205e0b7fc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
636bdba351767eeb786bc14205e0b7fc_JaffaCakes118.html
-
Size
773B
-
MD5
636bdba351767eeb786bc14205e0b7fc
-
SHA1
faba5f6074eb4ba2d8c0ddd3ab93ea81377617a1
-
SHA256
79ad7598ed6d650ed79646189a8836e2b08814837f2757429ede241d200ac3e3
-
SHA512
dcc20cf222e8524041cf47d6e02d32dc1163e1b4d46281e2f090921da7ec42a39b0017e40a09bd8ef667d450cfc28aae01b5277825523fe8cee899b08ab0f025
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1035a8f080abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422459189" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b565d0c21c4b244ca309a2baf9a8a661ba79fdb5ccd262a7d38a128722a5e762000000000e80000000020000200000005c7c2de78bf5b537808b67e9bdad0e40879eafa4607bcfb9df0ce79e3df65a4920000000ae7cd71d29cb7ca634c6124f9f01f918de01926595336ef01bce653d67ac3dc540000000a5103bc2dcc5f8007478bbcb77afcaabec8cddcf214fdc60504419a3c10e9af90ba4d93845971acf848cf9cb66d85cd070e799b69db0f9916fa2b059202d0b99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D334291-1774-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002489d00c22514cfbc731147b49ba70cdb141f3a05a7640e01e82d66621b67b1e000000000e8000000002000020000000ac9eaf94f8536248a4028de62cc1d7c47ce368a6702155838cd8fee3d94a59a79000000057ca0dd5685cd924abb06f2590b010f6b900bdde131cf9b29c9ea7362f8c8cd55d496ce0459540e27d1ec14cc0ea8938c30f77079664cd3f5197483f0ad416e7aaae2d9f20a1367c0d3f229b01482b8e0255b8eb7bcad71d146f7939b8cabf458a80be796152cc36bf0a9162a0aa2a529b805b9b421b1582dbb87f4c6a4698790b745aff9d36f1f8efab29bd47fc56d0400000007271c9871eb665edeade9c0cce0cf58a88ec72ee818e10efcea4042e77d53db73963c9ca39be139d5e0e96f11891c4c91fd0be29d46d5c8187aca90cdbeb587a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28 PID 2156 wrote to memory of 3012 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\636bdba351767eeb786bc14205e0b7fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f4385207b09cc5d8537151247a2858c
SHA145ef13dee4f21a7cee9ea1f1151502ec99b7c389
SHA256cc65ce1e40c27e5cbef3a3ace0b11bff7575bd3bc0cd65403eb757fe10fcd229
SHA512f11a5e6aaceb8d02f92104bbb8eeec53685c19fd1405cc98984f296b28fd440c7e55e854c013907b7f1a7ddfe4636621990a5dc10a718dee79d47d11a3427597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d75b7d5afb5e46945671e48897212d
SHA1a7b207f203ff743ae5eff53b0a6b18d0bf7e60bd
SHA256674da83409b7e7297769713752d2f5177920213a01d06413639b007f0d314170
SHA51235299f3a4c43522d330aa14dffcce6173d4a7012f3ab11e3628d9fd8478ac7af09b38e2feb2ab73aff85dc58549a7066354defd8260cd9019945d742d413fb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f591adc4def68c46a1be9d8d7e903f8e
SHA16f76f515e1baf12ef706bf8900bed4622c347678
SHA256500fb94526f00760fd26f6f42390198180fdf906cc2ac1678c2c13ad10abe2dd
SHA51229d96c3b7a3adf74e716e38aaaa3cb5b94d6477f4bbf4d76a83d3d5e00a7d9787cfb2f36320aaa708516b618b7d9babbe3d55958f36300763367c579c0f0296d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d3c3bb36633c98601266da323d15cd
SHA1a3a72f68e7682b37cbe94460a76f859f396023df
SHA2564af219f121f25bcd17ab297e0357cb814c4a41406b2a90fc5f3bed571248b2ff
SHA5123f477b121d424d15a9ba0b646bf0dbe86735366f16d8bfb144848b2b5f6140f65bbc9bbda73e376f7b15b4dd014b015097aad8f2aaa4b35dafb56d3ad39f497d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8f0a2182085710a9989f5a73bb943b
SHA1b1e3169eed5cf0a7b27610e98f68785863a18138
SHA25617b0b5c3cb895d54ffc998c7b4120304c795d6c095a454129c96ada9a12e3359
SHA5125a878cc710b7de2e026acaa6ed736ed0946f5a649ed6b5c1b085d533113565828a6b367f963bd4b159501d33ce0d20fe2903fcbf5f30956831ecd9b43f32139f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513ffdb6f18daf1dc3ceadfe6d4afaf31
SHA1824ae885e74a58389fb3e783d5d818a8c060ba2a
SHA2563ac4e9b25635ace9522113e3f5f905bbf590effccda6fa13ffc82111ee4ce3f3
SHA512c7da18833bb4296448b042a499b931b6ef582f8f19bb59c7a325574630b4693d5709c0edb5c84c1779ff1325f147ac3b41ca62bb029337dd37634566b699b5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b04e92530e176635c8a50b785ea95ea
SHA108d4178c28ff254c1e7ee417054dd453f3f19a2c
SHA2563f031130c32255c175c403684270e872570a34574008db8800b54c7adda7729c
SHA512bef0abb9ca1bfe2ee91f9bf2491b50317f51df25264eb58c2fc1d447cbe2cac859bf1b445601235f29a2d86022121a12673b5bde130f6d8eeaebe4e81acb48d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dcc87150b195bb42b5ff896ea1487f2
SHA100f78c7b49c89ad34fde1a16ec75e5e4e0e37c4a
SHA25610800097eef7450772c9cb590e9a1e185222cbdb94aeeb715b8a0657bc0c81de
SHA512ffe49ff404e394184f079ec7185c6dab2e09e328a14ab6df9ce7de1a2e479b5356f1104e42942bbccd5cd96bb8d2040d6ad8c682f67f0af4c8750109ee57dd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53126d490629ace68faef3c6514d1373a
SHA1dc0dd37ae4625afe504e1b7b4f5e1fa88e3f8149
SHA256c453842add3863ef5d83f2b27e0331899d46db2096ca33e112368ee2ba36bc6d
SHA512cdf6166f32640fa9d07c490cb0bfb94a7f568248e284cbf860826e75c463c2c09cc3f3011d59bdda812178a2d5b39941fca79d02f32f6eb91616c853dcf7656d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56091134c6a8ad9fc05f2fa0e73c9b03c
SHA18851a801032b26309b3944fc13e1e5ef19316634
SHA2562f0f58c02df0d14a134ee6352e58aaf7af2543f65740c043b9fa1e73b546383e
SHA5124c94810a15aba295448b0b925a3ccc24cfbcc8b41d74f2fbd757758a09e5eb83bc976e647dfe7aa79e8ae0c7402f9dc5e3cb55054ee82aefab8e5b15cab7c306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a18208095561632e49fcddea5fe9b7
SHA123c6f853b832c44579fbf0015f5fcda7e0bcfd85
SHA256022c005cacc40753f1f598050d7ed739d50ded9c422c06e144d4400cdd4d023a
SHA5121370ca15d4151eff6bc8a61661e4e3dae3148090ca63ef71cb197830486a1811b07b919e37c155d9fb64a615e4c3199c3101f4c8f9c34b6d7fc9103824a1c51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d71c20f9fc3e7a998e741920b620e4
SHA15969ba55875eb3791932a2704ac581392c6d263e
SHA2566e3057aace65a8b751822c43e90a9d787d229693b485a22c195cb5b83a4a4261
SHA5123761cca2f478da83d732a87933e44fa85160b5d816135e3f54f3631f1319e07e3e4482b0bbc5ac4345f0113242328b2b470cf0935cc81358b11514fd4a0458f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9da658a281c5e1cc03ffc85c1319cce
SHA1d22b68ee89a0622eb57cd167dbf12187e0bdd993
SHA25676dd4690a876223f131c1ca04e7e507c9bbb2103fae2b05f2a7e9aeed3d59d00
SHA51266c1ed4468917add07c6c60823b6540bc95fe1d8d3ed81768b0de7220189175f370bade20179c1b14a1b63d04e711e83a804238551e2861f9120f3d8a0e047d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb10e7b763d819162ed6332ddb7cc40
SHA15a51409c4a25a2dff5afde7602d32aa040a3d344
SHA256d657a6bc3f09e4b1b49f47d9a1b619eb8d62701aee4b2d15e9b71bd08400e2e2
SHA512820d7b3e32e4405a9296b3f734fbb2ea49229a233398684f54ed5ad58631098d273b04b6758264fc93fdef4ba6902c8e8dc04ecfd433ad2f148bcd7385e078a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da2ab32d45e360f2c749373a7e8aee50
SHA1c950b7e3cbf595a95c72e6b57f2322adb7ffcf08
SHA256915bcce29e1f930c13eb70e798adb79e980f352bc4c112ae621952371f65a044
SHA512cdd4ade72e7a1462eb75fcd1f13b9d02ecf9ef1cd6e73f061f7b70d16c0abb2a2a24f35b995b0686de242cc7654a8def9287aad698af3bf90b8987f0e5bdd80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531d8c568cf9b7768b55fe45eb0b76cf0
SHA1db2ad423d88c6084211a0a60a58cc671519e6e27
SHA2565146b296997bb0b97f81e246a7ccc72e80fc8dd227ad46d924fd8c5d7d16d69c
SHA51212b7d46d611adb8754e914b16ab08fae8dc5f748c7b6f5e64fefe68f72b7a01d2e582f3f10bc432275998d5230139b8b4f1274b7dd6599ee4681696b7a5d2cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5351a38ebeea80481145b2272d9eac835
SHA1523c356552e999638f60432322e5738ac930e447
SHA25621a0d17eb2ba6e8f44702c227480b66b45a706a3221dd8190167b44bdfee7fd8
SHA512db40ac924014e654bd741adbe10e8b389de5ab73dc41aa7ba947afbb81331e593b631db4d28950fcc1ddcad3fb4c17983a9570fc9d06bb047abd9ed9d8eeb19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc1131dfa8500e0cde991250b3cbd5ba
SHA1f90f03c72e967c1a7129757b9b35997c0d126a73
SHA2568db406b6d9be6827a75e5b7c5addbc7266606f6978244ff3c6373eca7bfd018f
SHA5125e4be38e5404b321d185122878226058f26fb355fd77e6783378fa74381d866e00aad5a9a07a05d695c01a329bd2f5888ae2fef818c9f257e225ab5d1ac2249a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfdf631302c3611cda89c9e5f5d78c8e
SHA1d5c44fb9c61d90db84683c60e877abe768c3aa4c
SHA25696011635853afd3e341c3771ef40e45f258809be06f33b043fe19f4fb3a1cc85
SHA5124ab3a378a9607c76fa9a4f72c76aedc1325e2f82fae18ff2dd588fb10811743a0a06907119c64c7372b81437656d9805259bffc7f58ba122807783b37dc21903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af369d65e854b2a23926fa86ed404c1
SHA1e11f26ebfd57b2abacd97da0a1936c8dc64bc403
SHA256cb776fc47a1dff6e065089d5eb7e741f6793a175073508b69ebc965d78aaf9e0
SHA512455236b7008b449257d0c2caf2e01ae2f69a1192669c42ffb6ae30de7e1990378e0caab17eca5386501eeb9c59c8a855c9363a8ff970664ce968c3e323f9438d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a